[vc_listinghero featured_image=”1441″ headline_text=”Content Library” description_text=”Browse our diverse selection of cybersecurity topics to learn more and get started on your cyber learning journey.” cta_text=”” cta_url=”” gradient_percentage=”.5″]
  • All
  • Case Studies
  • E-books
  • Event
  • Infographics
  • News
  • Videos
  • Webinars
  • White Papers

Back to Teaching: How 3 Cyber Educators Turned Curriculum into Project-Based Learning Experiences

Reading Time: < 1 minute

Addressing Cyber Curriculum Challenges

Reading Time: < 1 minute

What’s the Cloud Got To Do with it? Implications for Cyber Training and Readiness

Reading Time: < 1 minute Join Circadence’s Karl Gossett as he explains the shifts to the cloud and how cyber training is changing as a result. What should cyber pros be aware of and build skills for? 

Driving Educator Success in 2021

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/webinar-20q2-driving-educator-success-in-2021-what-ought-we-know-to-pivot-teaching-with-a-focus-on-cyber-education

Preparing Today’s Workforce for the Cybersecurity Careers of the Future

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/21q1-pursuit-of-cyber-careers-webinar

Gamified Cyber Skills Training Platform – Australian Launch

Reading Time: < 1 minute https://us02web.zoom.us/webinar/register/WN_GUq1qFIXQGy2C_a_W_bvcQ

Conversations with a Cyber Educator: Capella University

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/webinar-how-capella-university-adopted-hands-on-learning-with-project-ares

Cyber Training on Your Terms: Project Ares Updates

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/webinar-project-ares-updates-21q1-1

Great Dance Partners: Why Cyber Security and Risk Mitigation Go Hand-in-Hand

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/webinar-20q3-fei-webinar

7 Steps to Support a Cyber Career Pathway

Reading Time: < 1 minute https://marketing.circadence.com/acton/media/36273/webinar-7-steps-to-a-support-a-successful-cyber-career-pathway

Transitions to the Cloud: Considerations for Cyber Training and Readiness

Reading Time: < 1 minute Join Karl Gossett as he explains the challenges and opportunities with businesses shifting operations to the cloud and how cyber training is impacted.

Incidents & Innovations in Government Cyber Security Training

Reading Time: < 1 minute

Transform Distance Learning through Creative and Practical Technology with Focus on Cybersecurity Education

Reading Time: < 1 minute A panel webinar with Microsoft and Circadence higher education experts. Join us to discuss the state of distance and blended learning and discover the technologies to support today’s educators teaching in the classroom or remotely to keep student engagement strong.

Teaching Cyber Security Remotely

Reading Time: < 1 minute A resource for Information Security, Computer Science, Cyber Educators who are adapting to distance learning and teaching of cyber courses.

Calhan High School Success Story

Reading Time: < 1 minute

The I/O Psychology of Cyber Security: An RSA 2020 On-Demand Recording

Reading Time: < 1 minute Hear from Involta’s CISO Annalea Ilg and Spark Security Solution’s Keenan Skelly discuss how Industrial/Organizational psychology can help build better, more resilient cyber security teams. Presentation originally delivered live at RSA 2020 in San Francisco.

Leveraging Cloud-Based Cybersecurity Training for Improved Readiness

Reading Time: < 1 minute

Bringing the Cyber Classroom to Life with Hands-on, Gamified Learning

Reading Time: < 1 minute E-book on how computer science and cyber professionals can enrich the teaching experience with immersive learning.

Vulnerabilities & Cyber Training Opportunities in Critical Infrastructure

Reading Time: < 1 minute

Jack Voltaic 2.0 Uses Project Ares for Cyber Readiness Training

Reading Time: < 1 minute

Milam Elementary Embraces Immersive Cyber Learning with Project Ares

Reading Time: < 1 minute

Building an Immersive Cyber Curriculum with Project Ares

Reading Time: < 1 minute

Reimagining Cyber Learning with a Vocational Career College

Reading Time: < 1 minute Case Study with Divergence Academy, an education institution that is creating adaptive learning solutions.

Involta Improved Cyber Team Training with Project Ares

Reading Time: < 1 minute

Bringing Healthcare Cyber Security Back to Life Using Gamification and Cyber Range Learning

Reading Time: < 1 minute

Project Ares Play-by-Play: Protect Financial Institutions

Reading Time: < 1 minute Watch this on-demand webinar to see financial services cyber training activities available in the Project Ares platform.

The Future of Cyber Learning: Cloud-Based Training

Reading Time: < 1 minute As state and local governments shift operations to the cloud, it is more important than ever to stay on the front lines of cyber defense as cyber pros figure out how to secure cloud-based applications being used by employees. Speaker Wade Walters will discuss: Why government agencies are adopting cloud […]

Immersive Cyber Training with Project Ares: Ramping Up a Cyber Career

Reading Time: 9 minutes As promised, I’m back with a follow-up to my recent post on how we need modernize the learning experience for cybersecurity professionals by gamifying training to make learning fun.  Some of you may have attended the recent Microsoft Ignite events in Orlando and Paris.  I missed the conferences (ironically, due […]

Kickstarting a Cyber Career

Reading Time: < 1 minute To celebrate National Cyber Security Career Awareness Month in November, we’re highlighting the many ways that aspiring cyber security professionals and career changers alike can enter the field with confidence and competency. To start, join us as we share tips and recommendations for learning cyber at every stage from basic […]

Project Ares Demo with Brian Sheridan

Reading Time: < 1 minute October 22nd
11AM MST

Defining a Cyber Learning Journey for Your Company: A Product Overview from Circadence

Reading Time: < 1 minute October 7th
10AM MST

Strengthening Your Security Reputation E-Book

Reading Time: < 1 minute

Using AI and Gamified Learning to Prep Your Cyber Team E-Book

Reading Time: < 1 minute

Oil and Gas: Fueling Investments in Cyber Awareness & Training White Paper

Reading Time: < 1 minute

Using Gamification and Cyber Range Learning to Bring the Healthcare Industry Back to Life White Paper

Reading Time: < 1 minute

Protecting Utility and Electrical Infrastructure White Paper

Reading Time: < 1 minute

Amplifying Transportation Cyber Security Readiness White Paper

Reading Time: < 1 minute

How It’s Built – Project Ares

Reading Time: < 1 minute September 23rd
11 AM MST

How gamification, AI, and Reinforcement Learning will Revolutionize Cyber Skill Aquisition

Reading Time: < 1 minute Increase Cyber Skills with Gamification Join Bradley Hayes, Circadence Chief Technology Officer and Assistant Professor, University of Colorado Boulder Engineering and Applied Science, to learn how you can leverage AI to enhance the cyber competency and abilities. Where offensive, defensive and forensic security tools end, Bradley will share how human analysts can leverage […]

How AI and Gamification Change How We Build Cyber Skills

Reading Time: < 1 minute An infographic on how artificial intelligence and gamification enable cyber professional’s skill acquisition and competency development against today’s cyber threats.

Testimonials from Teachers and Students on Project Ares in the Classroom

Reading Time: < 1 minute Hear why and how teachers deployed Project Ares in the classroom to elevate cyber learning and teaching and what students thought of the experience.

How To Protect your Financial Services Company

Reading Time: < 1 minute Insider threats pose significant risk to your organization. Learn how persistent cyber training of professionals can help spot insider threats and reduce probabilities of a cyber-attack.

Do More with Less E-book

Reading Time: < 1 minute

Cyber as a Sport: How to Build Skills Through Gamified Competition

Reading Time: < 1 minute Increase Cyber Skills with Competition

There’s only so much that can be learned from books or tutorials, and hands-on gamified learning can better prepare you and your team for real-world threats and on-the-job situations.

For these reasons, cyber competitions are taking the industry by storm.

Whether you’re a seasoned cyber pro, newbie, student, or career changer, learn how cyber competitions can take you to the next level!

What You’ll Learn

What cyber competitions are
Why they are important to a strong security posture
How they work and add value to new and seasoned cybersecurity professionals

Securing Our Critical Infrastructure

Reading Time: < 1 minute 10 preventative measures for cybersecurity risks in our critical infrastructure industries.

Cyber Security in the Age of Digital Transformation

Reading Time: < 1 minute Is your company doing through a digital transformation? The age of digital transformation is prompting businesses to examine their increased threat surfaces and cyber risk. Circadence provides tips for how to ride the cyber security wave of digital transformation while keeping practices and preparedness efforts strong. From unifying security architecture […]

Get Gamified! Why Learning Happens Better with Games with Keenan Skelly

Reading Time: < 1 minute Gamification is a new, more engaging way for cyber professionals to learn and build new skills to keep pace with evolving threats. Speaker Keenan Skelly, VP of Global Partnerships at Circadence, will discuss: What gamification is and what it is not How it is being applied to cyber training Why […]

Critical Infrastructure Webinar with Laura Lee

Reading Time: < 1 minute What You’ll Learn How to build a strong cyber team for IT and OT    How critical infrastructure is impacted by evolving threats   Insight into live fire exercises to support cyber preparedness The critical infrastructure sector is not immune to cyberattacks. Between the evolving threat landscape and convergence of IT and […]

Top 10 Cyber Myths

Reading Time: < 1 minute The top cyber security myths CISOs and security professionals fall victim to. Empower yourself with persistent training and skill building instead.

Oil and Gas Cyber Security

Reading Time: < 1 minute

Gamification in Cyber Security

Reading Time: < 1 minute Make cyber learning fun again! Gamification is being applied to cybersecurity training for professional development purposes. Game mechanics can help security professionals improve information security techniques and diversify cyber thinking to better prevent and mitigate cyber threats. Gamified cyber exercises encourage healthy cyber hygiene behavior and improve security training retention […]

Safe Holiday Shopping

Reading Time: < 1 minute Online shopping is the new norm in today’s world, replacing brick and mortar shops one transaction at a time. With this shift in online consumerism, cybercriminals are taking notice. To mitigate the risks that come from online shopping, there are a few things you can do to better protect yourself.

What is a Watering Hole?

Reading Time: < 1 minute Cyber criminals are clever and know how to evolve. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisticated enterprises and government agencies. Recognizing a watering hole attack and how it […]

What is DevSecOps?

Reading Time: < 1 minute In today’s application development landscape, cyber attacks have become more frequent and sophisticated. Security architects are looking for new ways to ensure their products are safe and working properly for customers.

What is Phishing?

Reading Time: < 1 minute Most of us have probably heard about cyber adversaries using methods such as Phishing, Spear-Phishing, Whaling, Pharming, Drive by Downloads and Watering Holes creative ways to steal users credentials. These cleverly named attacks have been around for years but are still one of the most successful methods used to gain […]

What is Cyber Risk?

Reading Time: < 1 minute Most simply, cyber risk means any risk of financial loss, disruption or damage to the reputation of an organization from some sort of failure of its information technology systems. Cyber risk attempts to measure, in dollars lost, the impact of events based on their probability and severity.

What is a Red Team?

Reading Time: < 1 minute A “Red Team” is a group of people trained in the art of hacking, but using their skills for “good” (also known as an ethical, or white hat hacker). This group challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.

What is a Cyber Range?

Reading Time: < 1 minute Users generate a lot of traffic, and the systems which you depend on are expected to be available 24/7. You need to be on top of the latest threats to your organization and limit any potential down time for your infrastructure. Cyber ranges are virtual environments where cyber professionals can […]

What is Social Engineering?

Reading Time: < 1 minute Have you ever received a suspicious email with a garbled subject line? Or ever held the door open for an unverified solicitor? These are just some everyday situations where social engineering and its tactics play a larger part in seeking out information otherwise not available to them.

What is the C.I.A. Triad?

Reading Time: < 1 minute The C.I.A. triad is a security model designed to balance the protection of your online information. It stands for Confidentiality, Integrity and Availability, but the way these terms are applied here might be a bit different than what you’re used to…

Cyber Readiness Checklist

Reading Time: < 1 minute IS YOUR TEAM CYBER READY? A checklist for strengthening your cybersecurity environment

Gamification for cyber professional development fact sheet

Reading Time: < 1 minute To help organizations strengthen their overall security posture, gamification is emerging as an engaging, highly absorptive way for cybersecurity professionals to learn new skills.

Faces of Cyber Ranges for Academia White Paper

Reading Time: < 1 minute Tapping into Experiential Skill Building for Cybersecurity Teaching and Learning

Upskill Cyber Teams With Artificial Intelligence and Gamified Learning

Reading Time: < 1 minute How to Automate, Augment, and Better Prepare Cyber Professionals

Forming an Elite Transportation Cyber Team

Reading Time: < 1 minute

Learn By Doing on Gamified Cyber Ranges

Reading Time: < 1 minute

Practical Strategies for CISOs

Reading Time: < 1 minute

The Benefits of Gamified Learning

Reading Time: < 1 minute

Persistent Learning for Financial Services Cyber Teams

Reading Time: < 1 minute View descriptions of key financial services cyber security positions and learn 3 practical strategies for upskilling teams to effectively protect, defend, and respond to threats.

Cyber Tips to Avoid Holiday Hacks

Reading Time: < 1 minute

5 Strategies to fill the Cybersecurity Skills Gap

Reading Time: < 1 minute Financial services organizations face widening gaps in acquiring and developing strong cyber talent. Discover five ready-to-implement ways to maintain a cyber-ready team.

Learn the 3A’s for Enhanced Cyber Awareness

Reading Time: < 1 minute

What is a Cyber Range, and why do you need one?

Reading Time: < 1 minute

The Good, Bad, and Ugly of Cybersecurity

Reading Time: < 1 minute How to collaborate with, assess, and develop cyber teams for success.  

Gamifying Cybersecurity for Team-based Training and Assessments

Reading Time: < 1 minute Learn how Project Ares supports next generation learning and cyber leadership.  

Protecting Democracy From Election Hacking

Reading Time: < 1 minute A 5-step implementation strategy to address global election integrity in the wake of digitalization.  

Building a Fierce Financial Workforce

Reading Time: < 1 minute Discover the value and benefit of continually upskilling cyber professionals and positive implications it can have on overall organizational readiness against imminent threats.